• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4636010)   Today's Articles (293)   Subscriber (50080)
For: Aickelin U, Greensmith J. Sensing danger: Innate immunology for intrusion detection. ACTA ACUST UNITED AC 2007. [DOI: 10.1016/j.istr.2007.10.003] [Citation(s) in RCA: 27] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
Number Cited by Other Article(s)
1
Jiao L, Zhao J, Wang C, Liu X, Liu F, Li L, Shang R, Li Y, Ma W, Yang S. Nature-Inspired Intelligent Computing: A Comprehensive Survey. RESEARCH (WASHINGTON, D.C.) 2024;7:0442. [PMID: 39156658 PMCID: PMC11327401 DOI: 10.34133/research.0442] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/21/2024] [Accepted: 07/14/2024] [Indexed: 08/20/2024]
2
Widhalm  D, Goeschka  KM, Kastner  W. A Review on Immune-Inspired Node Fault Detection in Wireless Sensor Networks with a Focus on the Danger Theory. SENSORS (BASEL, SWITZERLAND) 2023;23:1166. [PMID: 36772205 PMCID: PMC9920811 DOI: 10.3390/s23031166] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/20/2022] [Revised: 01/09/2023] [Accepted: 01/17/2023] [Indexed: 06/18/2023]
3
Yang B, Chen YA. Dynamic memory risk identification model and simulation based on immune algorithm extension. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2018. [DOI: 10.3233/jifs-169720] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
4
Ijaz S, Hashmi FA, Asghar S, Alam M. Vector Based Genetic Algorithm to optimize predictive analysis in network security. APPL INTELL 2017. [DOI: 10.1007/s10489-017-1026-9] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
5
Structural design of the danger model immune algorithm. Inf Sci (N Y) 2012. [DOI: 10.1016/j.ins.2012.04.011] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
6
Wu SX, Banzhaf W. The use of computational intelligence in intrusion detection systems: A review. Appl Soft Comput 2010. [DOI: 10.1016/j.asoc.2009.06.019] [Citation(s) in RCA: 216] [Impact Index Per Article: 15.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
7
An immunity-based anomaly detection system with sensor agents. SENSORS 2009;9:9175-95. [PMID: 22291560 PMCID: PMC3260637 DOI: 10.3390/s91109175] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/30/2009] [Revised: 11/05/2009] [Accepted: 11/09/2009] [Indexed: 12/04/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA